Secretariat require the services of a seasoned Company Secretary in their Corporate Office in Sandton Managing the Statutory Calendar Compliance with the Companies Act Compliance with King IV Minutes and Resolutions experience in company secretarial or governance work Experience with King IV Experienced in the Companies Act Understand but is not required. Experience with Listed Companies and Groups with multiple subsidiaries. This role
monitor, and remediate ICT security issues.
Cyber Security Specialist required on a Fixed Term Contract in Midrand lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program.
Requirements: and Minimum of 8 + years of experience in Cyber Security role where you meet business deliverables.
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems systems and the company's overall security stance. Evaluate, report on, and propose strategies for mitigating
CyberPro Consulting is a professional services company servicing the South African, European and Australian Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related
CyberPro Consulting is a professional services company servicing the South African, European and Australian Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related
highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for as create proper security incident notification protocols. •Promotes the company's culture, purpose, the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements: